Stan Sieler ([log in to unmask]) wrote: [...] : If the process in question is running the program A.B.C, you'll get a : much more readable stacktrace by doing: : :run a.b.c; debug : pin #123 : tr,i,d : abort : Because you are running the same program file, Debug will know how to : translate code addresses with the program into symbolic addresses. A new trick (new to me, anyway) I find useful if the program is already running (can you say "OUTSPOOL", boys and girls? I thought you could): :COPY a.b.c,xx :debug > pin #123 > tr,i,d (shows stack without symbols. Note the space id) > xl xx <space id> (maps program file xx's symbols) > tr,i,d (shows stack with symbols) ... The "xl" command actually opens xx mapped. Be sure to use debug's UNMAP command when you're done, else you won't be able to purge xx. -Larry "in terms of obfuscation, Un*x is MPE Debug after it grows up" Byler-